CVE-2025-6217
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-21

Last updated on: 2025-08-18

Assigner: Zero Day Initiative

Description
PEAK-System Driver PCANFD_ADD_FILTERS Time-Of-Check Time-Of-Use Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of PEAK-System Driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of the PCANFD_ADD_FILTERS IOCTL. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-24161.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-21
Last Modified
2025-08-18
Generated
2026-05-07
AI Q&A
2025-06-21
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
peak-system device_driver 8.18.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-367 The product checks the state of a resource before using that resource, but the resource's state can change between the check and the use in a way that invalidates the results of the check.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-6217 is a local information disclosure vulnerability in the PEAK-System Driver related to the PCANFD_ADD_FILTERS IOCTL. It occurs because of improper locking during operations on an object, causing a time-of-check to time-of-use (TOCTOU) race condition. An attacker with low-privileged code execution on the system can exploit this flaw to disclose sensitive information. Additionally, this vulnerability can be combined with others to execute arbitrary code in the kernel context. [1]


How can this vulnerability impact me? :

This vulnerability can allow a local attacker with low privileges to disclose sensitive information from the affected system. Although the direct impact is limited to information disclosure, it can be leveraged with other vulnerabilities to execute arbitrary code in the kernel, potentially leading to full system compromise. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart